fa3ed1055999d9451ab84910cc6278d7a32ebbbd
[unfold.git] / portal / actions.py
1 from django.http                    import HttpResponse
2 from manifold.core.query            import Query
3 from manifoldapi.manifoldapi        import execute_query,execute_admin_query
4 from portal.models                  import PendingUser, PendingSlice, PendingAuthority, PendingProject, PendingJoin
5 from unfold.page                    import Page
6
7 import json
8
9 from django.contrib.auth.models     import User
10 from django.contrib.sites.models    import Site
11 from django.contrib.auth            import get_user_model
12 from django.template.loader         import render_to_string
13 from django.core.mail               import EmailMultiAlternatives, send_mail
14
15 from myslice.theme                  import ThemeView
16 from myslice.configengine           import ConfigEngine
17
18
19 theme = ThemeView()
20
21 import activity.slice
22
23 # Thierry: moving this right into the code so 
24 # most people can use myslice without having to install sfa
25 # XXX tmp sfa dependency, should be moved to SFA gateway
26 #from sfa.util.xrn                import Xrn 
27
28
29 # Get the list of pis in a given authority
30 def authority_get_pis(request, authority_hrn):
31     # CACHE PB with fields
32     page = Page(request)
33     metadata = page.get_metadata()
34     auth_md = metadata.details_by_object('authority')
35     auth_fields = [column['name'] for column in auth_md['column']]
36
37     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
38     query = Query.get('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).select(auth_fields)
39     results = execute_admin_query(request, query)
40     #print "authority_get_pis = %s" % results
41     # NOTE: temporarily commented. Because results is giving empty list. 
42     # Needs more debugging
43     #if not results:
44     #    raise Exception, "Authority not found: %s" % authority_hrn
45     #result, = results
46     #return result['pi_users']
47     return results
48
49 #check the user is pi or not in the registry
50 def authority_check_pis(request, user_email):
51     try:
52         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
53         user_details = execute_admin_query(request, user_query)
54     
55         # getting the authority_hrn
56         for user_detail in user_details:
57             user_id = user_detail['user_id']
58             if user_detail['config']:
59                 config = json.loads(user_detail['config'])
60                 authority_hrn = config.get('authority','Unknown Authority')
61  
62         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
63         account_details = execute_admin_query(request, account_query)
64     
65         platform_query  = Query().get('local:platform').select('platform_id','platform')
66         platform_details = execute_admin_query(request, platform_query)
67     
68         for account_detail in account_details:
69             for platform_detail in platform_details:
70                 if platform_detail['platform_id'] == account_detail['platform_id']:
71                     if 'myslice' in platform_detail['platform']:
72                         account_config = json.loads(account_detail['config'])
73                         user_hrn = account_config.get('user_hrn','N/A')
74
75         pi_status = False
76         pis = authority_get_pis (request, authority_hrn)
77         for pi in pis:
78             pi_list = pi['pi_users']
79
80         if user_hrn in pi_list:
81             pi_status = True
82         return pi_status
83
84     except Exception,e:
85         print "Exception in actions.py in authority_check_pis %s" % e
86         return None
87
88
89 def authority_add_pis(request, authority_hrn,user_hrn):
90     try:
91         # getting pis of the authority of the user
92         pis = authority_get_pis (request, authority_hrn)
93         for pi in pis:
94             pi_list = pi['pi_users']
95    
96         updated_pi_list = pi_list.append(user_hrn) 
97         query = Query.update('myslice:authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
98         results = execute_query(request,query)
99         newpis = authority_get_pis (request, authority_hrn)
100         return newpis
101     except Exception,e: 
102         print "Exception in actions.py in authority_add_pis %s" % e
103         return None
104
105
106 def authority_remove_pis(request, authority_hrn,user_hrn):
107     try:
108         # getting pis of the authority of the user
109         pis = authority_get_pis (request, authority_hrn)
110         for pi in pis:
111             pi_list = pi['pi_users']
112  
113         updated_pi_list = pi_list.remove(user_hrn) 
114         query = Query.update('authority').filter_by('authority_hrn', '==', authority_hrn).set({'pi_users':pi_list})
115         results = execute_query(request,query)
116         newpis = authority_get_pis (request, authority_hrn)
117         return newpis
118     except Exception,e: 
119         print "Exception in actions.py in authority_remove_pis %s" % e
120         return None
121
122
123 def authority_get_pi_emails(request, authority_hrn):
124     pi_users = authority_get_pis(request,authority_hrn)
125     print "pi_users = %s" % pi_users
126
127     if any(pi['pi_users'] == None or not pi['pi_users']  for pi in pi_users):
128         #theme.template_name = 'email_default_recipients.txt' 
129         #default_email = render_to_string(theme.template, request)
130         #default_email = default_email.replace('\n', '')
131         #return default_email
132         # the above doesn't work
133         return ['support@onelab.eu']
134     else:
135         pi_user_hrns = [ hrn for x in pi_users for hrn in x['pi_users'] ]
136
137         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
138         query = Query.get('myslice:user').filter_by('user_hrn', 'included', pi_user_hrns).select('user_email')
139         results = execute_admin_query(request, query)
140         return [result['user_email'] for result in results]
141
142 #clear user credentials
143 def clear_user_creds(request, user_email):
144     try:
145         user_query  = Query().get('local:user').filter_by('email', '==', user_email).select('user_id','email','password','config')
146         user_details = execute_admin_query(request, user_query)
147     
148         # getting the user_id from the session
149         for user_detail in user_details:
150             user_id = user_detail['user_id']
151             user_email = user_detail['email']
152     
153         account_query  = Query().get('local:account').filter_by('user_id', '==', user_id).select('user_id','platform_id','auth_type','config')
154         account_details = execute_admin_query(request, account_query)
155     
156         platform_query  = Query().get('local:platform').select('platform_id','platform')
157         platform_details = execute_admin_query(request, platform_query)
158     
159         for account_detail in account_details:
160             for platform_detail in platform_details:
161                 if platform_detail['platform_id'] == account_detail['platform_id']:
162                     if 'myslice' in platform_detail['platform']:
163                         account_config = json.loads(account_detail['config'])
164                         #user_cred = account_config.get('delegated_user_credential','N/A')
165                         user_cred = account_config.get('user_credential','N/A')
166                         if 'N/A' not in user_cred:
167                             user_hrn = account_config.get('user_hrn','N/A')
168                             user_pub_key = json.dumps(account_config.get('user_public_key','N/A'))
169                             user_priv_key = json.dumps(account_config.get('user_private_key','N/A'))
170                             updated_config = '{"user_public_key":'+ user_pub_key + ', "user_private_key":'+ user_priv_key + ', "user_hrn":"'+ user_hrn + '"}'
171                             user_params = { 'config': updated_config}
172                             manifold_update_account(request, user_id,user_params)
173                             return user_email
174                         else:
175                             return None
176
177     except Exception,e:
178         print "Exception in actions.py in clear_user_creds %s" % e
179         return None
180
181 def is_pi(wsgi_request, user_hrn, authority_hrn):
182     # authorities from user where user_hrn == "ple.upmc.jordan_auge"
183     print "#### actions.py is_pi authority_hrn = ", authority_hrn
184     try:
185         # CACHE PB with fields
186         page = Page(wsgi_request)
187         metadata = page.get_metadata()
188         user_md = metadata.details_by_object('user')
189         user_fields = [column['name'] for column in user_md['column']]
190         
191         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
192         query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
193         #query = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn).select('pi_authorities')
194         results = execute_query(wsgi_request, query)
195         print "is_pi results = ", results
196         for user_detail in results:
197             if authority_hrn in user_detail['pi_authorities']:
198                 return True
199     except Exception,e:
200         print "Exception in actions.py in is_pi %s" % e
201     return False
202     
203 # SFA get record
204
205 def sfa_get_user(request, user_hrn, pub=None):
206
207     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
208     query_sfa_user = Query.get('myslice:user').filter_by('user_hrn', '==', user_hrn)
209     result_sfa_user = execute_admin_query(request, query_sfa_user)
210     return result_sfa_user[0]                        
211
212 def sfa_update_user(request, user_hrn, user_params):
213     # user_params: keys [public_key] 
214     if 'email' in user_params:
215         user_params['user_email'] = user_params['email']
216
217     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
218     query = Query.update('myslice:user').filter_by('user_hrn', '==', user_hrn).set(user_params).select('user_hrn')
219     results = execute_admin_query(request,query)
220     return results
221
222 def sfa_add_authority(request, authority_params):
223
224     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
225     query = Query.create('myslice:authority').set(authority_params).select('authority_hrn')
226     results = execute_query(request, query)
227     print "sfa_add_auth results=",results
228     if not results:
229         raise Exception, "Could not create %s. Already exists ?" % authority_params['hrn']
230     return results
231
232 def sfa_add_user_to_slice(request, user_hrn, slice_params):
233 # UPDATE myslice:slice SET researcher=['ple.upmc.jordan_auge','ple.inria.thierry_parmentelat','ple.upmc.loic_baron','ple.upmc.ciro_scognamiglio','ple.upmc.mohammed-yasin_rahman','ple.upmc.azerty'] where slice_hrn=='ple.upmc.myslicedemo'
234
235     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
236     query_current_users = Query.get('myslice:slice').select('user').filter_by('slice_hrn','==',slice_params['hrn'])
237     results_current_users = execute_query(request, query_current_users)
238     slice_params['researcher'] = slice_params['researcher'] | results_current_users
239
240     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
241     query = Query.update('myslice:slice').filter_by('user_hrn', '==', user_hrn).set(slice_params).select('slice_hrn')
242     results = execute_query(request, query)
243 # Also possible but not supported yet
244 # UPDATE myslice:user SET slice=['ple.upmc.agent','ple.upmc.myslicedemo','ple.upmc.tophat'] where user_hrn=='ple.upmc.azerty'
245     if not results:
246         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
247     return results
248
249 # Propose hrn
250
251 def manifold_add_user(wsgi_request, request):
252     """Add a Manifold user corresponding to a user request.
253
254     Args:
255         wsgi_request: a WSGIRequest instance
256         request (dict): a dictionary containing the user request built from the
257             form.
258
259     Returns:
260         The user_id of the inserted user.
261
262     Raises:
263         ?
264     
265     """
266     USER_CONFIG = '{"firstname": "%(first_name)s", "lastname": "%(last_name)s", "authority": "%(authority_hrn)s"}'
267
268     user_params = {
269         'email'     : request['email'],
270         'password'  : request['password'],
271         'config'    : USER_CONFIG % request,
272         'status'    : 1,
273     }
274
275     query = Query.create('local:user').set(user_params).select('email')
276     results = execute_admin_query(request, query)
277     if not results:
278         raise Exception, "Failed creating manifold user: %s" % user_params['email']
279     result = results[0]
280     return result['email']
281
282 def manifold_update_user(request, email, user_params):
283     # user_params: password, config e.g., 
284     query = Query.update('local:user').filter_by('email', '==', email).set(user_params).select('email')
285     results = execute_admin_query(request,query)
286     # NOTE: results remains empty and goes to Exception. However, it updates the manifold DB.
287     # That's why I commented the exception part. -- Yasin 
288     #if not results:
289     #    raise Exception, "Failed updating manifold user: %s" % user_params['email']
290     #result, = results
291     return results
292
293 def manifold_add_account(request, account_params):
294     query = Query.create('local:account').set(account_params).select(['user', 'platform'])
295     results = execute_admin_query(request,query)
296     if not results:
297         raise Exception, "Failed creating manifold account on platform %s for user: %s" % (account_params['platform'], account_params['user'])
298     result, = results
299     return result['user_id']
300
301 def manifold_update_account(request,user_id,account_params):
302     # account_params: config
303     query = Query.update('local:account').filter_by('platform', '==', 'myslice').filter_by('user_id', '==', user_id).set(account_params).select('user_id')
304     results = execute_admin_query(request,query)
305     return results
306
307 #explicitly mention the platform_id
308 def manifold_delete_account(request, platform_id, user_id, account_params):
309     query = Query.delete('local:account').filter_by('platform_id', '==', platform_id).filter_by('user_id', '==', user_id).set(account_params).select('user_id')
310     results = execute_admin_query(request,query)
311     return results
312
313 def manifold_delete_user(request, user_id, user_params):
314     query = Query.delete('local:user').filter_by('user_id', '==', user_id).set(user_params).select('user_id')
315     results = execute_admin_query(request,query)
316     return results
317
318
319 #not tested
320 def manifold_add_platform(request, platform_params):
321     query = Query.create('local:platform').set(platform_params).select(['user', 'platform'])
322     results = execute_admin_query(request,query)
323     if not results:
324         raise Exception, "Failed creating manifold platform %s for user: %s" % (platform_params['platform'], platform_params['user'])
325     result, = results
326     return result['platform_id']
327
328
329 def make_request_user(user):
330     request = {}
331     request['type']          = 'user'
332     request['id']            = user.id
333     request['timestamp']     = user.created # XXX in DB ?
334     request['authority_hrn'] = user.authority_hrn
335     request['first_name']    = user.first_name
336     request['last_name']     = user.last_name
337     request['email']         = user.email
338     request['login']         = user.login
339     request['user_hrn']      = user.user_hrn
340     request['public_key']    = user.public_key
341     request['private_key']   = user.private_key
342     return request
343
344 def make_request_slice(slice):
345     request = {}
346     request['type'] = 'slice'
347     request['id'] = slice.id
348     request['user_hrn'] = slice.user_hrn
349     request['timestamp'] = slice.created
350     request['authority_hrn'] = slice.authority_hrn
351     request['slice_name'] = slice.slice_name
352     request['number_of_nodes'] = slice.number_of_nodes
353     request['type_of_nodes'] = slice.type_of_nodes
354     request['purpose'] = slice.purpose
355     return request
356
357 def make_request_project(project):
358     request = {}
359     request['type'] = 'project'
360     request['id'] = project.id
361     request['user_hrn'] = project.user_hrn
362     request['email'] = project.email
363     request['timestamp'] = project.created
364     request['authority_hrn'] = project.authority_hrn
365     request['project_name'] = project.project_name
366     request['purpose'] = project.purpose
367     return request
368
369 def make_request_join(join):
370     request = {}
371     request['type'] = 'join'
372     request['id'] = join.id
373     request['user_hrn'] = join.user_hrn
374     request['email'] = join.email
375     request['timestamp'] = join.created
376     request['authority_hrn'] = join.authority_hrn
377     request['project_name'] = join.project_name
378     return request
379
380 def make_request_authority(authority):
381     request = {}
382     request['type']                  = 'authority'
383     request['id']                    = authority.id
384     request['site_name']             = authority.site_name
385     request['site_latitude']         = authority.site_latitude
386     request['site_longitude']        = authority.site_longitude
387     request['site_url']              = authority.site_url
388     request['site_authority']        = authority.site_authority
389     request['site_abbreviated_name'] = authority.site_abbreviated_name
390     request['address_line1']         = authority.address_line1
391     request['address_line2']         = authority.address_line2
392     request['address_line3']         = authority.address_line3
393     request['address_city']          = authority.address_city
394     request['address_postalcode']    = authority.address_postalcode
395     request['address_state']         = authority.address_state
396     request['address_country']       = authority.address_country
397     request['authority_hrn']         = authority.authority_hrn
398     request['timestamp']             = authority.created
399     return request
400
401 def make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins):
402     print "$$$$$$$$$$$$$$$  make_request"
403     requests = []
404     for user in pending_users:
405         requests.append(make_request_user(user))
406     for slice in pending_slices:
407         requests.append(make_request_slice(slice))
408     for authority in pending_authorities:
409         requests.append(make_request_authority(authority))
410     for project in pending_projects:
411         requests.append(make_request_project(project))
412     for join in pending_joins:
413         requests.append(make_request_join(join))
414     return requests   
415
416 def get_request_by_id(ids):
417     print "$$$$$$$$$$$$$$$$  get_request_by_id"
418     sorted_ids = { 'user': [], 'slice': [], 'authority': [], 'project': [], 'join': [] }
419     for type__id in ids:
420         type, id = type__id.split('__')
421         sorted_ids[type].append(id)
422         
423     if not ids:
424         pending_users  = PendingUser.objects.all()
425         pending_slices = PendingSlice.objects.all()
426         pending_authorities = PendingAuthority.objects.all()
427         pending_projects = PendingProject.objects.all()
428         pending_joins = PendingJoin.objects.all()
429     else:
430         pending_users  = PendingUser.objects.filter(id__in=sorted_ids['user']).all()
431         pending_slices = PendingSlice.objects.filter(id__in=sorted_ids['slice']).all()
432         pending_authorities = PendingAuthority.objects.filter(id__in=sorted_ids['authority']).all()
433         pending_projects = PendingProject.objects.filter(id__in=sorted_ids['project']).all()
434         pending_joins = PendingJoin.objects.filter(id__in=sorted_ids['join']).all()
435
436     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
437
438 def get_requests(authority_hrns=None):
439     print "$$$$$$$$$$$$$   get_request_by_authority auth_hrns = ", authority_hrns
440     if not authority_hrns:
441         ## get those pending users who have confirmed their emails
442         pending_users  = PendingUser.objects.filter(status__iexact = 'True')
443         pending_slices = PendingSlice.objects.all()
444         pending_authorities = PendingAuthority.objects.all()
445         pending_projects = PendingProject.objects.all()
446         pending_joins = PendingJoin.objects.all()
447     else:
448         pending_users  = PendingUser.objects
449         pending_slices = PendingSlice.objects
450         pending_authorities = PendingAuthority.objects
451         pending_projects = PendingProject.objects
452         pending_joins = PendingJoin.objects
453         from django.db.models import Q
454         list_user_Q = list()
455         list_slice_Q = list()
456         list_auth_Q = list()
457         list_proj_Q = list()
458         list_join_Q = list()
459         for hrn in authority_hrns:
460             list_user_Q.append(Q(authority_hrn__startswith=hrn, status__iexact = 'True'))
461             list_slice_Q.append(Q(authority_hrn__startswith=hrn))
462             list_auth_Q.append(Q(site_authority__startswith=hrn))
463             list_proj_Q.append(Q(authority_hrn__startswith=hrn))
464             list_join_Q.append(Q(authority_hrn__startswith=hrn))
465         from operator import __or__ as OR
466         pending_users        = pending_users.filter(reduce(OR, list_user_Q))
467         pending_slices       = pending_slices.filter(reduce(OR, list_slice_Q))
468         pending_authorities  = pending_authorities.filter(reduce(OR, list_auth_Q))
469         pending_projects     = pending_projects.filter(reduce(OR, list_proj_Q))
470         pending_joins        = pending_joins.filter(reduce(OR, list_join_Q))
471         #pending_authorities  = pending_authorities.all() #filter(reduce(OR, list_Q))
472
473     return make_requests(pending_users, pending_slices, pending_authorities, pending_projects, pending_joins)
474
475 # XXX Is it in sync with the form fields ?
476
477 def portal_validate_request(wsgi_request, request_ids):
478     status = {}
479
480     if not isinstance(request_ids, list):
481         request_ids = [request_ids]
482
483     requests = get_request_by_id(request_ids)
484     for request in requests:
485         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
486         # CAREFUL about details
487         # user  : first name, last name, email, password, keypair
488         # slice : number of nodes, type of nodes, purpose
489         
490         request_status = {}
491
492         if request['type'] == 'user':
493
494             try:
495                 create_user(wsgi_request, request)
496                 request_status['SFA user'] = {'status': True }
497                 PendingUser.objects.get(id=request['id']).delete()
498             except Exception, e:
499                  request_status['SFA user'] = {'status': False, 'description': str(e)}
500                        
501 #            user_params = {'status':2}
502 #            manifold_update_user(request, request['email'], user_params)
503
504             # MANIFOLD user should be added beforehand, during registration
505             #try:
506             #    manifold_user_params = { key: request[key] for key in MANIFOLD_USER_KEYS }
507             #    # XXX # manifold_add_user(manifold_user_params)
508             #    request_status['MySlice user'] = {'status': True }
509             #except Exception, e:
510             #    request_status['MySlice user'] = {'status': False, 'description': str(e)}
511
512             # XXX
513             #manifold_account_params = { key: request[key] for key in MANIFOLD_ACCOUNT_KEYS }
514             #manifold_add_account(manifold_account_params)
515             #request_status['MySlice testbed accounts'] = {'status': False }
516
517         elif request['type'] == 'slice':
518             try:
519                 create_slice(wsgi_request, request)
520                 request_status['SFA slice'] = {'status': True }
521                 PendingSlice.objects.get(id=request['id']).delete()
522
523                 # Clear user's Credentials
524                 sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
525                 clear_user_creds(wsgi_request,sfa_user['user_email'])
526
527             except Exception, e:
528                 request_status['SFA slice'] = {'status': False, 'description': str(e)}
529
530         elif request['type'] == 'authority':
531             try:
532                 #hrn = "%s.%s" % (request['authority_hrn'], request['site_authority'])
533                 hrn = request['site_authority']
534                 # XXX tmp sfa dependency
535                 from sfa.util.xrn import Xrn 
536                 urn = Xrn(hrn, request['type']).get_urn()
537                 
538                 # Only hrn is required for Manifold Query 
539                 sfa_authority_params = {
540                     'authority_hrn'        : hrn,
541                     #'authority_urn'        : urn,
542                     #'type'       : request['type'],
543                     #'pi'        : None,
544                     #'enabled'    : True
545                 }
546                 print "ADD Authority"
547                 sfa_add_authority(wsgi_request, sfa_authority_params)
548                 request_status['SFA authority'] = {'status': True }
549                 PendingAuthority.objects.get(id=request['id']).delete()
550
551             except Exception, e:
552                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
553
554         elif request['type'] == 'project':
555             try:
556                 hrn = request['authority_hrn'] + '.' + request['project_name']
557
558                 # Only hrn is required for Manifold Query 
559                 sfa_authority_params = {
560                     'authority_hrn'        : hrn
561                 }
562                 sfa_add_authority(wsgi_request, sfa_authority_params)
563                 request_status['SFA project'] = {'status': True }
564                 PendingProject.objects.get(id=request['id']).delete()
565                 
566                 # Add user as a PI of the project
567                 authority_add_pis(wsgi_request, hrn , request['user_hrn'])
568
569                 # Clear user's Credentials
570                 #sfa_user = sfa_get_user(wsgi_request, request['user_hrn'])
571                 clear_user_creds(wsgi_request,request['email'])
572
573             except Exception, e:
574                 request_status['SFA project'] = {'status': False, 'description': str(e)}
575
576         elif request['type'] == 'join':
577             try:
578                 # Add user as a PI of the project
579                 authority_add_pis(wsgi_request, request['authority_hrn'] , request['user_hrn'])
580
581                 request_status['SFA join'] = {'status': True }
582                 PendingJoin.objects.get(id=request['id']).delete()
583
584                 # Clear user's Credentials
585                 clear_user_creds(wsgi_request,request['email'])
586
587             except Exception, e:
588                 request_status['SFA join'] = {'status': False, 'description': str(e)+' - '+str(request)}
589         else:
590             request_status['other'] = {'status': False, 'description': 'unknown type of request'}
591         # XXX Remove from Pendings in database
592
593         status['%s__%s' % (request['type'], request['id'])] = request_status
594
595     return status
596
597 def validate_action(request, **kwargs):
598     ids = filter(None, kwargs['id'].split('/'))
599     status = portal_validate_request(request, ids)
600     json_answer = json.dumps(status)
601     return HttpResponse (json_answer, mimetype="application/json")
602
603
604 def reject_action(request, **kwargs):
605     ids = filter(None, kwargs['id'].split('/'))
606     status = portal_reject_request(request, ids)
607     json_answer = json.dumps(status)
608     return HttpResponse (json_answer, mimetype="application/json")
609
610
611 def portal_reject_request(wsgi_request, request_ids):
612     status = {}
613     # get the domain url    
614     current_site = Site.objects.get_current()
615     current_site = current_site.domain
616
617
618     if not isinstance(request_ids, list):
619         request_ids = [request_ids]
620
621     requests = get_request_by_id(request_ids)
622     for request in requests:
623         # type, id, timestamp, details, allowed -- MISSING: authority_hrn
624         # CAREFUL about details
625         # user  : first name, last name, email, password, keypair
626         # slice : number of nodes, type of nodes, purpose
627         
628         request_status = {}
629
630         if request['type'] == 'user':
631             try:
632                 request_status['SFA user'] = {'status': True }
633                 # getting user email based on id 
634                 ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
635                 for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE id = %s', [request['id']]):
636                     user_email= user.email
637                     first_name = user.first_name
638                     last_name = user.last_name
639
640                 ctx = {
641                     'first_name'    : first_name, 
642                     'last_name'     : last_name, 
643                     'portal_url'    : current_site,
644                     }
645                 try:
646                     theme.template_name = 'user_request_denied.txt'
647                     text_content = render_to_string(theme.template, ctx)
648                     theme.template_name = 'user_request_denied.html'
649                     html_content = render_to_string(theme.template, ctx)
650                     theme.template_name = 'email_default_sender.txt'
651                     sender =  render_to_string(theme.template, ctx)
652                     sender = sender.replace('\n', '')
653                                
654                     subject = 'User request denied.'
655
656                     msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
657                     msg.attach_alternative(html_content, "text/html")
658                     msg.send()
659                 except Exception, e:
660                     print "Failed to send email, please check the mail templates and the SMTP configuration of your server"   
661             
662                 # removing from Django auth_user
663                 UserModel = get_user_model()
664                 UserModel._default_manager.filter(email__iexact = user_email).delete()
665                 # removing from Django portal_pendinguser
666                 PendingUser.objects.get(id=request['id']).delete()
667                 # removing from manifold
668                 # removing manifold account
669                 user_query = Query().get('local:user') \
670                     .filter_by('email', '==', user_email)           \
671                     .select('user_id')
672                 user = execute_admin_query(wsgi_request, user_query)
673                 user_id = user[0]['user_id']
674         
675                 platform_query = Query().get('local:platform') \
676                     .filter_by('platform', '==', 'myslice')           \
677                     .select('platform_id')
678                 platform = execute_admin_query(wsgi_request, platform_query)
679                 platform_id = platform[0]['platform_id']
680                 account_params = {'user_id':user_id}
681                 manifold_delete_account(request, platform_id, user_id, account_params)           
682              
683                 # removing manifold user
684                 user_params = {'user_id':user_id}
685                 manifold_delete_user(request, user_id, user_params)
686             except Exception, e:
687                 request_status['SFA authority'] = {'status': False, 'description': str(e)}
688                       
689         elif request['type'] == 'slice':
690             request_status['SFA slice'] = {'status': True } 
691
692             # getting user email based on id 
693             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
694             for user in PendingSlice.objects.raw('SELECT * FROM portal_pendingslice WHERE id = %s', [request['id']]):
695                 user_email= user.type_of_nodes # XXX type_of_nodes field contains the email [shd be renamed in DB]
696                 slice_name = user.slice_name
697                 purpose = user.purpose
698                 url = user.number_of_nodes
699
700             ctx = {
701                 'slice_name': slice_name,
702                 'purpose': purpose,
703                 'url': url,
704                 'portal_url': current_site,
705                 }
706             try:
707                 theme.template_name = 'slice_request_denied.txt'
708                 text_content = render_to_string(theme.template, ctx)
709                 theme.template_name = 'slice_request_denied.html'
710                 html_content = render_to_string(theme.template, ctx)
711                 theme.template_name = 'email_default_sender.txt'
712                 sender =  render_to_string(theme.template, ctx)
713                 sender = sender.replace('\n', '')
714                                
715                 subject = 'Slice request denied.'
716
717                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
718                 msg.attach_alternative(html_content, "text/html")
719                 msg.send()
720             except Exception, e:
721                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
722                       
723             PendingSlice.objects.get(id=request['id']).delete()
724
725         elif request['type'] == 'authority':
726             request_status['SFA authority'] = {'status': True }
727             
728             # getting user email based on id 
729             ## RAW SQL queries on Django DB- https://docs.djangoproject.com/en/dev/topics/db/sql/
730             for user in PendingAuthority.objects.raw('SELECT * FROM portal_pendingauthority WHERE id = %s', [request['id']]):
731                 user_email= user.address_line1 # XXX address_line1 field contains the email [shd be renamed in DB]
732                 site_name = user.site_name
733                 city = user.address_city
734                 country = user.address_country
735                 short_name = user.site_abbreviated_name
736                 url = user.site_url
737
738             ctx = { 
739                 'site_name': site_name,
740                 'short_name': short_name,
741                 'url': url,
742                 'city': city,
743                 'country': country,                          
744                 'portal_url'    : current_site,
745                 }
746                 
747             try:
748                 theme.template_name = 'authority_request_denied.txt'
749                 text_content = render_to_string(theme.template, ctx)
750                 theme.template_name = 'authority_request_denied.html'
751                 html_content = render_to_string(theme.template, ctx)
752                 theme.template_name = 'email_default_sender.txt'
753                 sender =  render_to_string(theme.template, ctx)
754                 sender = sender.replace('\n', '')
755                 subject = 'Authority request denied.'
756                 msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
757                 msg.attach_alternative(html_content, "text/html")
758                 msg.send()
759             except Exception, e:
760                 print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
761
762             PendingAuthority.objects.get(id=request['id']).delete()
763
764         # XXX TMP we should send an email to the user to inform him/her
765         elif request['type'] == 'project':
766             request_status['SFA project'] = {'status': True }
767             PendingProject.objects.get(id=request['id']).delete()
768
769         elif request['type'] == 'join':
770             request_status['SFA join'] = {'status': True }
771             PendingJoin.objects.get(id=request['id']).delete()
772
773         status['%s__%s' % (request['type'], request['id'])] = request_status
774
775     return status
776
777 # Django and ajax
778 # http://djangosnippets.org/snippets/942/
779
780
781
782 #-------------------------------------------------------------------------------
783 # REQUESTS - Slices
784 #-------------------------------------------------------------------------------
785
786 def create_slice(wsgi_request, request):
787     """
788     Arguments:
789         wsgi_request (~ WSGIRequest) : 
790         request (dict) : the slice request in our own dict format
791
792     Raises:
793         Exception
794     """
795     hrn = "%s.%s" % (request['authority_hrn'], request['slice_name'])
796     # XXX tmp sfa dependency
797     from sfa.util.xrn import Xrn 
798     urn = Xrn(hrn, request['type']).get_urn()
799     
800     # Add User to Slice if we have the user_hrn in pendingslice table
801     user_hrn = request.get('user_hrn', None)
802     user_hrns = list([user_hrn]) if user_hrn else list()
803    
804     # CACHE PB with fields
805     page = Page(wsgi_request)
806     metadata = page.get_metadata()
807     user_md = metadata.details_by_object('user')
808     user_fields = [column['name'] for column in user_md['column']]
809
810     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
811     #user_query  = Query().get('myslice:user').select('user_hrn','user_email').filter_by('user_hrn','==',user_hrn)
812     user_query  = Query().get('myslice:user').select(user_fields).filter_by('user_hrn','==',user_hrn)
813     user_details_sfa = execute_admin_query(wsgi_request, user_query)
814     if not user_details_sfa:
815         raise Exception, "User %s doesn't exist, validate user before validating slice" % user_hrn
816     for user in user_details_sfa:
817         user_email = user['user_email']
818
819     # XXX LOIC Quick fix because this is totally inconsistent
820     if not 'number_of_nodes' in request:
821         request['number_of_nodes']=""
822
823     # XXX We should create a slice with Manifold terminology
824     slice_params = {
825         'slice_hrn'        : hrn, 
826         'slice_urn'        : urn,
827         'slice_type'       : request['type'],
828         'url'              : request['number_of_nodes'],
829         'users'            : user_hrns,
830         'slice_enabled'    : True
831     }
832     # ignored in request: id, timestamp,  number_of_nodes, type_of_nodes, purpose
833
834     # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
835     query = Query.create('myslice:slice').set(slice_params).select('slice_hrn')
836     results = execute_query(wsgi_request, query)
837     if not results:
838         raise Exception, "Could not create %s. Already exists ?" % slice_params['hrn']
839     else:
840         clear_user_creds(wsgi_request,user_email)
841         # log user activity
842         activity.slice.validate(request, { "slice" : hrn })
843         try:
844             theme.template_name = 'slice_request_validated.txt'
845             text_content = render_to_string(theme.template, request)
846             theme.template_name = 'slice_request_validated.html'
847             html_content = render_to_string(theme.template, request)
848         
849             theme.template_name = 'email_default_sender.txt'
850             sender =  render_to_string(theme.template, request)
851             sender = sender.replace('\n', '')
852
853             subject = 'Slice request validated'
854
855             msg = EmailMultiAlternatives(subject, text_content, sender, [user_email])
856             msg.attach_alternative(html_content, "text/html")
857             msg.send()
858         except Exception, e:
859             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
860        
861     return results
862
863 def create_pending_slice(wsgi_request, request, email):
864     """
865     """
866
867     # Insert an entry in the PendingSlice table
868     s = PendingSlice(
869         slice_name      = request['slice_name'],
870         user_hrn        = request['user_hrn'],
871         authority_hrn   = request['authority_hrn'],
872         number_of_nodes = request['url'], # field needs to be renamed
873         purpose         = request['purpose'],
874         type_of_nodes   = request['email'] # field needs to be renamed 
875     )
876     s.save()
877
878     try:
879         # Send an email: the recipients are the PI of the authority
880         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
881
882         theme.template_name = 'slice_request_email.txt' 
883         text_content = render_to_string(theme.template, request)
884     
885         theme.template_name = 'slice_request_email.html' 
886         html_content = render_to_string(theme.template, request)
887     
888         theme.template_name = 'slice_request_email_subject.txt'
889         subject = render_to_string(theme.template, request)
890         subject = subject.replace('\n', '')
891     
892         sender = email
893         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
894         msg.attach_alternative(html_content, "text/html")
895         msg.send()
896     except Exception, e:
897         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
898
899
900 def create_pending_project(wsgi_request, request):
901     """
902     """
903
904     # Insert an entry in the PendingProject table
905     s = PendingProject(
906         project_name    = request['project_name'],
907         user_hrn        = request['user_hrn'],
908         email           = request['email'],
909         authority_hrn   = request['authority_hrn'],
910         purpose         = request['purpose'],
911     )
912     s.save()
913
914 def create_pending_join(wsgi_request, request):
915     """
916     """
917
918     # Insert an entry in the PendingJoin table
919     s = PendingJoin(
920         user_hrn        = request['user_hrn'],
921         email           = request['email'],
922         project_name    = request['project_name'],
923         authority_hrn   = request['authority_hrn'],
924     )
925     s.save()
926
927
928 #     try:
929 #         # Send an email: the recipients are the PI of the authority
930 #         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
931
932 #         theme.template_name = 'slice_request_email.txt' 
933 #         text_content = render_to_string(theme.template, request)
934 #     
935 #         theme.template_name = 'slice_request_email.html' 
936 #         html_content = render_to_string(theme.template, request)
937 #     
938 #         theme.template_name = 'slice_request_email_subject.txt'
939 #         subject = render_to_string(theme.template, request)
940 #         subject = subject.replace('\n', '')
941 #     
942 #         sender = email
943 #         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
944 #         msg.attach_alternative(html_content, "text/html")
945 #         msg.send()
946 #     except Exception, e:
947 #         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
948
949
950 #-------------------------------------------------------------------------------
951 # REQUESTS - Users
952 #-------------------------------------------------------------------------------
953
954 def manifold_add_reference_user_accounts(wsgi_request, request):
955     """When a new user is created, add reference accounts to the reference platform.
956     """
957     # XXX XXX XXX The rest of this function has to be checked XXX XXX XXX
958
959     # Retrieve user information
960     user_query  = Query().get('local:user')             \
961         .select('user_id', 'config', 'email', 'status') \
962         .filter_by('email', '==', request['email'])
963     user_details = execute_admin_query(wsgi_request, user_query)
964
965     # USER MAIN ACCOUNT != reference
966     #print 'USER MAIN ACCOUNT != reference'
967     list_accounts_query = Query().get('local:account')              \
968         .select('user_id', 'platform_id', 'auth_type', 'config')    \
969         .filter_by('user_id', '==', user_details[0]['user_id'])     \
970         .filter_by('auth_type', '!=', 'reference')
971     list_accounts = execute_admin_query(wsgi_request, list_accounts_query)
972
973     # XXX main_platform is being erased several times ???
974     for account in list_accounts:
975         main_platform_query = Query().get('local:platform')         \
976             .select('platform_id', 'platform')                      \
977             .filter_by('platform_id', '==', account['platform_id'])
978         main_platform = execute_admin_query(wsgi_request, main_platform_query)
979
980     # Add reference accounts on SFA enabled platforms
981     platforms_query = Query().get('local:platform') \
982         .filter_by('disabled', '==', '0')           \
983         .filter_by('gateway_type', '==', 'sfa')     \
984         .select('platform_id', 'gateway_type')
985     platforms = execute_admin_query(wsgi_request, platforms_query)
986     for platform in platforms:
987         #print "add reference to platform ",platform
988         manifold_account_params = {
989             'user_id'       : user_details[0]['user_id'],
990             'platform_id'   : platform['platform_id'],
991             'auth_type'     : 'reference',
992             'config'        : '{"reference_platform": "' + main_platform[0]['platform'] + '"}',
993         }
994         manifold_add_account(wsgi_request, manifold_account_params)
995
996 def sfa_create_user(wsgi_request, request, namespace = None, as_admin = False):
997     """
998     Arguments:
999         wsgi_request (~ WSGIRequest) : 
1000         request (dict) : the user request in our own dict format
1001
1002     Raises:
1003         Exception
1004     """
1005     from sfa.util.xrn import Xrn 
1006
1007     auth_pi = request.get('pi', None)
1008     auth_pi = list([auth_pi]) if auth_pi else list()
1009
1010     # We create a user request with Manifold terminology
1011     sfa_user_params = {
1012         'user_hrn'          : request['user_hrn'],
1013         'user_email'        : request['email'],
1014         'user_urn'          : Xrn(request['user_hrn'], request['type']).get_urn(),
1015         'user_type'         : request['type'],
1016         'keys'              : request['public_key'],
1017         'user_first_name'   : request['first_name'],
1018         'user_last_name'    : request['last_name'],
1019         'pi_authorities'    : auth_pi,
1020         'user_enabled'      : True
1021     }
1022
1023     if namespace is not None:
1024         query = Query.create('%s:user' % namespace).set(sfa_user_params).select('user_hrn')
1025     else:
1026         # REGISTRY ONLY TO BE REMOVED WITH MANIFOLD-V2
1027         query = Query.create('myslice:user').set(sfa_user_params).select('user_hrn')
1028
1029     if as_admin:
1030         results = execute_admin_query(wsgi_request, query)
1031     else:
1032         results = execute_query(wsgi_request, query)
1033
1034     if not results:
1035         raise Exception, "Could not create %s. Already exists ?" % sfa_user_params['user_hrn']
1036     else:
1037         try:
1038             theme.template_name = 'user_request_validated.txt'
1039             text_content = render_to_string(theme.template, request)
1040             theme.template_name = 'user_request_validated.html'
1041             html_content = render_to_string(theme.template, request)
1042         
1043             theme.template_name = 'email_default_sender.txt'
1044             sender =  render_to_string(theme.template, request)
1045             sender = sender.replace('\n', '')
1046
1047
1048             subject = 'User validated'
1049
1050             msg = EmailMultiAlternatives(subject, text_content, sender, [request['email']])
1051             msg.attach_alternative(html_content, "text/html")
1052             msg.send()
1053         except Exception, e:
1054             print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1055
1056     return results
1057
1058 def iotlab_create_user (wsgi_request, request, namespace = None, as_admin=False):
1059    
1060     import requests
1061     import time
1062     from requests.auth import HTTPBasicAuth
1063     
1064     URL_REST = ConfigEngine.default_iotlab_url
1065     LOGIN_ADMIN = ConfigEngine.default_iotlab_admin_user
1066     PASSWORD_ADMIN = ConfigEngine.default_iotlab_admin_password
1067
1068     auth = HTTPBasicAuth(LOGIN_ADMIN,PASSWORD_ADMIN)
1069     headers = {'content-type': 'application/json'}
1070
1071     for user in PendingUser.objects.raw('SELECT * FROM portal_pendinguser WHERE email = %s', [request['email']]):
1072         password= user.password
1073
1074
1075     iotlab_user_params = {
1076         "type"          : "SA",
1077         #"login"         : request['email'], #auto generated by iotlab
1078         "password"      : password,
1079         "firstName"     : request['first_name'],
1080         "lastName"      : request['last_name'],
1081         "email"         : request['email'],
1082         "structure"     : request['authority_hrn'],
1083         "city"          : "N/A",
1084         "country"       : "N/A",
1085         "sshPublicKey"  : request['public_key'],
1086         "motivations"   : "SFA federation",
1087     }    
1088    
1089     iotlab_user_params1 = json.dumps(iotlab_user_params)
1090     r=requests.post(url=URL_REST, data=iotlab_user_params1, headers=headers, auth=auth)
1091     print 'Create iotlab user : ', r.status_code, r.text
1092     return r.text
1093
1094 def create_user(wsgi_request, request, namespace = None, as_admin = False):
1095     # XXX This has to be stored centrally
1096     USER_STATUS_ENABLED = 2
1097
1098     # NOTE : if we were to create a user directly (just like we create slices,
1099     # we would have to perform the steps in create_pending_user too
1100
1101     # Add the user to the SFA registry
1102     sfa_create_user(wsgi_request, request, namespace, as_admin)
1103
1104     # Update Manifold user status
1105     manifold_update_user(wsgi_request, request['email'], {'status': USER_STATUS_ENABLED})
1106
1107     # Add reference accounts for platforms
1108     manifold_add_reference_user_accounts(wsgi_request, request)
1109
1110     # Add the user to iotlab portal if theme is set to onelab
1111     if theme.theme == 'onelab':
1112         iotlab_create_user (wsgi_request, request)
1113
1114 def create_pending_user(wsgi_request, request, user_detail):
1115     """
1116     """
1117
1118     # Insert an entry in the PendingUser table
1119     b = PendingUser(
1120         first_name    = request['first_name'],
1121         last_name     = request['last_name'],
1122         authority_hrn = request['authority_hrn'],
1123         email         = request['email'],
1124         password      = request['password'],
1125         public_key    = request['public_key'],
1126         private_key   = request['private_key'],
1127         user_hrn      = request['user_hrn'],
1128         pi            = request['pi'],
1129         email_hash    = request['email_hash'],
1130         status        = 'False',
1131     )
1132     b.save()
1133     # sends email to user to activate the email
1134     theme.template_name = 'activate_user.html'
1135     html_content = render_to_string(theme.template, request)
1136     theme.template_name = 'activate_user.txt'
1137     text_content = render_to_string(theme.template, request)
1138     theme.template_name = 'activate_user_email_subject.txt'
1139     subject = render_to_string(theme.template, request)
1140     subject = subject.replace('\n', '')
1141     theme.template_name = 'email_default_sender.txt'
1142     sender =  render_to_string(theme.template, request)
1143     sender = sender.replace('\n', '')
1144     recipient = [request['email']]
1145     #recipient = recipient.append(request['email'])
1146
1147     msg = EmailMultiAlternatives(subject, text_content, sender, recipient)
1148     msg.attach_alternative(html_content, "text/html")
1149     msg.send()
1150    
1151     # saves the user to django auth_user table [needed for password reset]
1152     user = User.objects.create_user(request['email'], request['email'], request['password'])
1153
1154     # Creating a manifold user
1155     user_id = manifold_add_user(wsgi_request, request)
1156
1157     # Creating a Manifold account on the MySlice platform
1158     # Note the JSON representation of public and private keys already includes quotes
1159     account_config = {
1160         'user_hrn'          : request['user_hrn'],
1161         'user_public_key'   : request['public_key'],
1162     }
1163     if request['private_key']:
1164         account_config['user_private_key'] = request['private_key']
1165
1166     user_id = user_detail['user_id'] + 1 # the user_id for the newly created user in local:user
1167
1168     # XXX TODO: Require a myslice platform
1169     # ALERT: this will disapear with ROUTERV2 of Manifold
1170     # We have to consider the case where several registries can be used
1171     # Removed hardcoded platform = 5
1172     # This platform == 'myslice' is a TMP FIX !!
1173     try:
1174         reg_platform_query = Query().get('local:platform') \
1175             .filter_by('platform', '==', 'myslice')           \
1176             .select('platform_id')
1177         reg_platform = execute_admin_query(wsgi_request, reg_platform_query)
1178
1179         reg_platform_id = reg_platform[0]['platform_id']
1180         account_params = {
1181             'platform_id'   : reg_platform_id, # XXX ALERT !!
1182             'user_id'       : user_id, 
1183             'auth_type'     : request['auth_type'], 
1184             'config'        : json.dumps(account_config),
1185         }
1186         manifold_add_account(wsgi_request, account_params)
1187     except Exception, e:
1188         print "Failed creating manifold account on platform %s for user: %s" % ('myslice', request['email'])
1189
1190     try:
1191         # Send an email: the recipients are the PI of the authority
1192         # If No PI is defined for this Authority, send to a default email (different for each theme)
1193         recipients = authority_get_pi_emails(wsgi_request, request['authority_hrn'])
1194         
1195         theme.template_name = 'user_request_email.html'
1196         html_content = render_to_string(theme.template, request)
1197  
1198         theme.template_name = 'user_request_email.txt'
1199         text_content = render_to_string(theme.template, request)
1200     
1201         theme.template_name = 'user_request_email_subject.txt'
1202         subject = render_to_string(theme.template, request)
1203         subject = subject.replace('\n', '')
1204     
1205         theme.template_name = 'email_default_sender.txt'
1206         sender =  render_to_string(theme.template, request)
1207         sender = sender.replace('\n', '')
1208     
1209         msg = EmailMultiAlternatives(subject, text_content, sender, recipients)
1210         msg.attach_alternative(html_content, "text/html")
1211         msg.send()
1212     except Exception, e:
1213         print "Failed to send email, please check the mail templates and the SMTP configuration of your server"
1214         import traceback
1215         traceback.print_exc()